Virtual private network

NFV network function virtualization security considerations

I have been asked to write down a few things related to NFV and security. NFV is relatively a new thing in the IT world. It has been on the news in 2012 and since then it has followed the developing path common to the virtualization technologies. Virtualization has made dramatic improvement in the last years. It all started at first with simple virtualization platforms, of course VMware on top of our mind, but not only. The idea was to abstract HW platforms from software ones. Developing the idea, the abstraction growth covering multiple hw platforms moving also to the…

Firewall: Traditional, UTM and NGFW. Understanding the difference

Firewall: Traditional, UTM and NGFW. Understanding the difference One of the problem nowadays when we talk about firewalls is to understand what actually a firewall is and what means the acronym that are used to define the different type of firewalls. The common definition today recognizes 3 main types of firewalls: • Firewalls • UTM • NGFW But what are the differences (if any) between those things? Let’s start with the very basic: what a firewall is. Firewall: A firewall is software used to maintain the security of a private network. Firewalls block unauthorized access to or from private networks…

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy or PGP is a popular program used to encrypt and decrypt email over the Internet, as well as authenticate messages with digital signatures and encrypted stored files. Previously available as freeware and now only available as a low-cost commercial version, PGP was once the most widely used privacy-ensuring program by individuals and is also used by many corporations. It was developed by Philip R. Zimmermann in 1991 and has become a de facto standard for email security. How PGP works Pretty Good Privacy uses a variation of the public key system. In this…

Our memories are all we have

I am in China for work, with a few connection to the real world outside, so Italian news usually comes to me late, when I am able to connect to internet from hotel; great firewall allowing. Being isolated from the Italian reality put things into a different perspective, allow you to keep less news with more time to digest and think about. It happened a few days ago I learned of the death of Umberto Eco, one of the greatest Italian tinker of our age. He was a great writer, a great thinker, a truly free spirit. The first thing I did…

Whoops! Check Point lets checkpoint.com expire

Image via CrunchBase Whoops! Check Point lets checkpoint.com expire: By Tim Greene | Network World US | 03 April 12 It’s got to be a little embarrassing for a security company steeped in paying attention to details like opening and closing firewall ports and monitoring whether applications are behaving oddly to overlook … Related articles Check Point Takes Security Products To Amazon Check Point in domain expiry snafu Check Point supports cloud security for Amazon Web Services Sentrigo Achieves OPSEC Certification From Check Point Check Point supports cloud security for Amazon Web Services How To Evaluate Next-Generation Firewalls Email cock-up…

PostOffice: Mobile users and security (Update)

PostOffice: “Mobile users and security (Update)0 commentswe finally have also the abstract and the agenda of the Clusit training that Alessio Pennasilico and I will held. here you are(check clusit website for registration and location) https://edu.clusit.it/ At first was the computer on the desktop. The, a day the modem comes home, and VPN and then laptop computers. And desktops were changed by laptops, and then mobile phones and we started to use them as modems, exchange mails, then arrived wap browsing, and after that the full browser ones, and complex web applications and smarthphones, tablets… https://clusit.it/” Related posts: Whoops! Check…

Can Android be an enterprise mobile OS without vpn support?

Image via Wikipedia and here we are Android is not only the winning mobile OS in terms of vulnerability, but in order to make things clear it is also not provided with a decent vpnipsec solution. nNw would be useful to add, at least, a vpn support for cisco anyconnect and the major vpn vendors in the market, but till now it seems Google is not interested in making its OS a real enterprise OS. Would you put your info on a smart device that not support ssl or ipsec vpn for business transactions? this sound like careless computing. remember…

Posts navigation